Question :
21.Which of the following statements correct? TCP/IP
a.is the basic protocol

21.Which of the following statements is correct? TCP/IP

a.is the basic protocol that permits communication between Internet sites.

b.controls Web browsers that access the WWW.

c.is the file format used to produce Web pages.

d.is a low-level encryption scheme used to secure transmissions in HTTP format.

22.FTP

a.is the document format used to produce Web pages.

b.controls Web browsers that access the Web.

c.is used to connect to Usenet groups on the Internet

d.is used to transfer text files, programs, spreadsheets, and databases across the Internet.

e.is a low-level encryption scheme used to secure transmissions in higher-level () format.

23. An XBRL taxonomy:

a. is the document format used to produce web pages.

b. is the final product (report).

c. is a classification scheme.

d. is a tag stored in each database record.

e. none of the above is true.

24.HTML

a.is the document format used to produce Web pages.

b.controls Web browsers that access the Web.

c.is used to connect to Usenet groups on the Internet.

d.is used to transfer text files, programs, spreadsheets, and databases across the Internet.

e.is a low-level encryption scheme used to secure transmissions in higher-level () format.

25.Which one of the following statements is correct?

a.Cookies always contain encrypted data.

b.Cookies are text files and never contain encrypted data.

c.Cookies contain the URLs of sites visited by the user.

d.Web browsers cannot function without cookies.

26.A message that is made to look as though it is coming from a trusted source but is not is called

a.a denial of service attack

b.digital signature forging

c.Internet protocol spoofing

d.URL masquerading

27. An IP Address:

a. defines the path to a facility or file on the web.

b. is the unique address that every computer node and host attached to the Internet must have .

c. is represented by a 64-bit data packet.

d. is the address of the protocol rules and standards that governing the design of internet hardware and software.

e. none of the above is true.

28.A digital signature is

a.the encrypted mathematical value of the message sender’s name

b.derived from the digest of a document that has been encrypted with the sender’s private key

c.the computed digest of the sender’s digital certificate

d.allows digital messages to be sent over analog telephone lines

29.HTTP

a.is the document format used to produce Web pages.

b.controls Web browsers that access the Web.

c.is used to connect to Usenet groups on the Internet

d.is used to transfer text files, programs, spreadsheets, and databases across the Internet.

e.is a low-level encryption scheme used to secure transmissions in higher-level () format.

30.Which of the following statements is correct?

a.Packet switching combines the messages of multiple users into a “packet” for transmission. At the receiving end, the packet is disassembled into the individual messages and distributed to the intended users.

b.The decision to partition a database assumes that no identifiable primary user exists in the organization.

c.Message switching is used to establish temporary connections between network devices for the duration of a communication session.

d.A deadlock is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the data needed by other users.